SlideShare a Scribd company logo
3.1 outline why security and
confidentiality are important in a
business environment
Questions
• What do businesses need to keep
secure?
• Why do they need to secure
information, equipment and people?
• What are the consequences for not
securing information, people and
equipment ?
Why security and confidentiality are
important in a business environment
• Every company has resources which need to be
kept secure.
• In your groups discuss the types of resources
that a company may need to secure.
• These resources may take many forms, from the
items owned by the company to the
information it handles and the people who work
there.
What businesses need to keep secure
and confidential!
• Property- Buildings, company cars, computer
equipment, storage facilities and any other
valuable items kept on site needs to be
protected from fire and theft.
What businesses need to keep secure
and confidential! continued…
• Information- paper records and electronic date may
contain sensitive information such as the personal
details of employees, suppliers and customers, the
financial information of the company and confidential
business plans.
• Data may also contain details that give the business
competitive advantages, such as new products or
initiatives.
• All information should be kept secure in a way that
prevents this information from becoming known to
those who should not see it.
What businesses need to keep secure
and confidential! continued…
• People- Members of staff and visitors have a
right to be safe whilst on the business
premises.
• This includes maintaining health and safety
and preventing unauthorized people from
entering.
The consequences
• If steps are not taken to protect property,
information and people, not only could the
result be personal loss and trauma, but it
could also harm the business’s finances and
reputation
How do businesses keep
property secure?
Task
Business should have a range of procedures in
place to ensure that property is kept secure at
all times.
In your groups, choose a company and discuss
the procedure for securing information,
property and people.
You will need to present your ideas to the
rest of the group.
How businesses keep property secure
Security passes
• When you start to work at the company, you
will probably be given your own security pass,
usually with your name and photo on it.
• You may be required to wear or carry it at all
times, and often it will be needed to open
doors. When you finish working for the
company, you will need to hand it back.
How businesses keep property secure
Entry systems
• Modern offices can usually only be accessed
using security passes or key codes, which you
need to type into a pad beside the door.
• If you are given a key to a door, look after it
carefully.
How businesses keep property secure
Alarm systems
Businesses with audible alarm systems will have
processes in place. Such as, how to set up or
deactivate the the alarms if you are the first or
last person on site.
You should find out what to do beforehand.
How businesses keep property secure
Visitor procedures
• Visitors should report to reception and be able to
give the name of the person they are visiting. They
will normally sign in and be given a pass for the day.
They should be accompanied from reception to
where they are going.
• All visitors need to sign out when they leave the
premises
How businesses keep property secure
Security labels
• Valuable equipment, such as computers,
should be labelled with a code so that they
can be recovered more easily if they are
stolen.

More Related Content

Similar to Security and confidentiality in Business

Harshit security
Harshit securityHarshit security
Harshit security
HarshitGupta435
 
Investigative Team
Investigative TeamInvestigative Team
Investigative Team
CTIN
 
Corporate Ways to Protect Confidential Information.pdf
Corporate Ways to Protect Confidential Information.pdfCorporate Ways to Protect Confidential Information.pdf
Corporate Ways to Protect Confidential Information.pdf
JOHN BABATUNDE LEE
 
it-security.ppt
it-security.pptit-security.ppt
it-security.ppt
AmanSoni665879
 
Your Employees and Information Security
Your Employees and Information SecurityYour Employees and Information Security
Your Employees and Information Security
Shred-it
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
- Mark - Fullbright
 
Compliance is a Team Project
Compliance is a Team ProjectCompliance is a Team Project
Compliance is a Team Project
The TNS Group
 
4 it-security.ppt
4 it-security.ppt4 it-security.ppt
4 it-security.ppt
DevenderDahiya9
 
Importance of workplace Security.pptx
Importance of workplace Security.pptxImportance of workplace Security.pptx
Importance of workplace Security.pptx
Security Guards
 
cybersecurity
cybersecurity cybersecurity
cybersecurity
AkshaySajith3
 
Tradesecrets
TradesecretsTradesecrets
Tradesecrets
Kamma K Babu
 
People are the biggest risk
People are the biggest riskPeople are the biggest risk
People are the biggest risk
Evan Francen
 
The Confidentiality in the Workplace.pptx
The Confidentiality in the Workplace.pptxThe Confidentiality in the Workplace.pptx
The Confidentiality in the Workplace.pptx
MeleniaCabatan3
 
Privacy for tech startups
Privacy for tech startups Privacy for tech startups
Privacy for tech startups
Marc Gallardo
 
wipo_smes_ge_07_www_81574.ppt
wipo_smes_ge_07_www_81574.pptwipo_smes_ge_07_www_81574.ppt
wipo_smes_ge_07_www_81574.ppt
SarthakKalia1
 
GDPR and Cyber Security LW.pptx
GDPR and Cyber Security LW.pptxGDPR and Cyber Security LW.pptx
GDPR and Cyber Security LW.pptx
TimBee1
 
Internet monitoring
Internet monitoringInternet monitoring
Internet monitoring
Corrje
 
Unit 1
Unit 1Unit 1
LW GDPR and Cyber Security.pptx
LW GDPR and Cyber Security.pptxLW GDPR and Cyber Security.pptx
LW GDPR and Cyber Security.pptx
TimBee1
 
A Case For Information Protection Programs
A Case For Information Protection ProgramsA Case For Information Protection Programs
A Case For Information Protection Programs
Michael Annis
 

Similar to Security and confidentiality in Business (20)

Harshit security
Harshit securityHarshit security
Harshit security
 
Investigative Team
Investigative TeamInvestigative Team
Investigative Team
 
Corporate Ways to Protect Confidential Information.pdf
Corporate Ways to Protect Confidential Information.pdfCorporate Ways to Protect Confidential Information.pdf
Corporate Ways to Protect Confidential Information.pdf
 
it-security.ppt
it-security.pptit-security.ppt
it-security.ppt
 
Your Employees and Information Security
Your Employees and Information SecurityYour Employees and Information Security
Your Employees and Information Security
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Compliance is a Team Project
Compliance is a Team ProjectCompliance is a Team Project
Compliance is a Team Project
 
4 it-security.ppt
4 it-security.ppt4 it-security.ppt
4 it-security.ppt
 
Importance of workplace Security.pptx
Importance of workplace Security.pptxImportance of workplace Security.pptx
Importance of workplace Security.pptx
 
cybersecurity
cybersecurity cybersecurity
cybersecurity
 
Tradesecrets
TradesecretsTradesecrets
Tradesecrets
 
People are the biggest risk
People are the biggest riskPeople are the biggest risk
People are the biggest risk
 
The Confidentiality in the Workplace.pptx
The Confidentiality in the Workplace.pptxThe Confidentiality in the Workplace.pptx
The Confidentiality in the Workplace.pptx
 
Privacy for tech startups
Privacy for tech startups Privacy for tech startups
Privacy for tech startups
 
wipo_smes_ge_07_www_81574.ppt
wipo_smes_ge_07_www_81574.pptwipo_smes_ge_07_www_81574.ppt
wipo_smes_ge_07_www_81574.ppt
 
GDPR and Cyber Security LW.pptx
GDPR and Cyber Security LW.pptxGDPR and Cyber Security LW.pptx
GDPR and Cyber Security LW.pptx
 
Internet monitoring
Internet monitoringInternet monitoring
Internet monitoring
 
Unit 1
Unit 1Unit 1
Unit 1
 
LW GDPR and Cyber Security.pptx
LW GDPR and Cyber Security.pptxLW GDPR and Cyber Security.pptx
LW GDPR and Cyber Security.pptx
 
A Case For Information Protection Programs
A Case For Information Protection ProgramsA Case For Information Protection Programs
A Case For Information Protection Programs
 

Recently uploaded

Innovation Management Frameworks: Your Guide to Creativity & Innovation
Innovation Management Frameworks: Your Guide to Creativity & InnovationInnovation Management Frameworks: Your Guide to Creativity & Innovation
Innovation Management Frameworks: Your Guide to Creativity & Innovation
Operational Excellence Consulting
 
Digital Marketing with a Focus on Sustainability
Digital Marketing with a Focus on SustainabilityDigital Marketing with a Focus on Sustainability
Digital Marketing with a Focus on Sustainability
sssourabhsharma
 
Part 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 SlowdownPart 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 Slowdown
jeffkluth1
 
Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024
Top Forex Brokers Review
 
Industrial Tech SW: Category Renewal and Creation
Industrial Tech SW:  Category Renewal and CreationIndustrial Tech SW:  Category Renewal and Creation
Industrial Tech SW: Category Renewal and Creation
Christian Dahlen
 
The latest Heat Pump Manual from Newentide
The latest Heat Pump Manual from NewentideThe latest Heat Pump Manual from Newentide
The latest Heat Pump Manual from Newentide
JoeYangGreatMachiner
 
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
AnnySerafinaLove
 
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
taqyea
 
Ellen Burstyn: From Detroit Dreamer to Hollywood Legend | CIO Women Magazine
Ellen Burstyn: From Detroit Dreamer to Hollywood Legend | CIO Women MagazineEllen Burstyn: From Detroit Dreamer to Hollywood Legend | CIO Women Magazine
Ellen Burstyn: From Detroit Dreamer to Hollywood Legend | CIO Women Magazine
CIOWomenMagazine
 
DearbornMusic-KatherineJasperFullSailUni
DearbornMusic-KatherineJasperFullSailUniDearbornMusic-KatherineJasperFullSailUni
DearbornMusic-KatherineJasperFullSailUni
katiejasper96
 
Sustainable Logistics for Cost Reduction_ IPLTech Electric's Eco-Friendly Tra...
Sustainable Logistics for Cost Reduction_ IPLTech Electric's Eco-Friendly Tra...Sustainable Logistics for Cost Reduction_ IPLTech Electric's Eco-Friendly Tra...
Sustainable Logistics for Cost Reduction_ IPLTech Electric's Eco-Friendly Tra...
IPLTech Electric
 
GKohler - Retail Scavenger Hunt Presentation
GKohler - Retail Scavenger Hunt PresentationGKohler - Retail Scavenger Hunt Presentation
GKohler - Retail Scavenger Hunt Presentation
GraceKohler1
 
How HR Search Helps in Company Success.pdf
How HR Search Helps in Company Success.pdfHow HR Search Helps in Company Success.pdf
How HR Search Helps in Company Success.pdf
HumanResourceDimensi1
 
一比一原版(QMUE毕业证书)英国爱丁堡玛格丽特女王大学毕业证文凭如何办理
一比一原版(QMUE毕业证书)英国爱丁堡玛格丽特女王大学毕业证文凭如何办理一比一原版(QMUE毕业证书)英国爱丁堡玛格丽特女王大学毕业证文凭如何办理
一比一原版(QMUE毕业证书)英国爱丁堡玛格丽特女王大学毕业证文凭如何办理
taqyea
 
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
hartfordclub1
 
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
my Pandit
 
Income Tax exemption for Start up : Section 80 IAC
Income Tax  exemption for Start up : Section 80 IACIncome Tax  exemption for Start up : Section 80 IAC
Income Tax exemption for Start up : Section 80 IAC
CA Dr. Prithvi Ranjan Parhi
 
Profiles of Iconic Fashion Personalities.pdf
Profiles of Iconic Fashion Personalities.pdfProfiles of Iconic Fashion Personalities.pdf
Profiles of Iconic Fashion Personalities.pdf
TTop Threads
 
The Most Inspiring Entrepreneurs to Follow in 2024.pdf
The Most Inspiring Entrepreneurs to Follow in 2024.pdfThe Most Inspiring Entrepreneurs to Follow in 2024.pdf
The Most Inspiring Entrepreneurs to Follow in 2024.pdf
thesiliconleaders
 
The Genesis of BriansClub.cm Famous Dark WEb Platform
The Genesis of BriansClub.cm Famous Dark WEb PlatformThe Genesis of BriansClub.cm Famous Dark WEb Platform
The Genesis of BriansClub.cm Famous Dark WEb Platform
SabaaSudozai
 

Recently uploaded (20)

Innovation Management Frameworks: Your Guide to Creativity & Innovation
Innovation Management Frameworks: Your Guide to Creativity & InnovationInnovation Management Frameworks: Your Guide to Creativity & Innovation
Innovation Management Frameworks: Your Guide to Creativity & Innovation
 
Digital Marketing with a Focus on Sustainability
Digital Marketing with a Focus on SustainabilityDigital Marketing with a Focus on Sustainability
Digital Marketing with a Focus on Sustainability
 
Part 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 SlowdownPart 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 Slowdown
 
Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024
 
Industrial Tech SW: Category Renewal and Creation
Industrial Tech SW:  Category Renewal and CreationIndustrial Tech SW:  Category Renewal and Creation
Industrial Tech SW: Category Renewal and Creation
 
The latest Heat Pump Manual from Newentide
The latest Heat Pump Manual from NewentideThe latest Heat Pump Manual from Newentide
The latest Heat Pump Manual from Newentide
 
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
 
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
 
Ellen Burstyn: From Detroit Dreamer to Hollywood Legend | CIO Women Magazine
Ellen Burstyn: From Detroit Dreamer to Hollywood Legend | CIO Women MagazineEllen Burstyn: From Detroit Dreamer to Hollywood Legend | CIO Women Magazine
Ellen Burstyn: From Detroit Dreamer to Hollywood Legend | CIO Women Magazine
 
DearbornMusic-KatherineJasperFullSailUni
DearbornMusic-KatherineJasperFullSailUniDearbornMusic-KatherineJasperFullSailUni
DearbornMusic-KatherineJasperFullSailUni
 
Sustainable Logistics for Cost Reduction_ IPLTech Electric's Eco-Friendly Tra...
Sustainable Logistics for Cost Reduction_ IPLTech Electric's Eco-Friendly Tra...Sustainable Logistics for Cost Reduction_ IPLTech Electric's Eco-Friendly Tra...
Sustainable Logistics for Cost Reduction_ IPLTech Electric's Eco-Friendly Tra...
 
GKohler - Retail Scavenger Hunt Presentation
GKohler - Retail Scavenger Hunt PresentationGKohler - Retail Scavenger Hunt Presentation
GKohler - Retail Scavenger Hunt Presentation
 
How HR Search Helps in Company Success.pdf
How HR Search Helps in Company Success.pdfHow HR Search Helps in Company Success.pdf
How HR Search Helps in Company Success.pdf
 
一比一原版(QMUE毕业证书)英国爱丁堡玛格丽特女王大学毕业证文凭如何办理
一比一原版(QMUE毕业证书)英国爱丁堡玛格丽特女王大学毕业证文凭如何办理一比一原版(QMUE毕业证书)英国爱丁堡玛格丽特女王大学毕业证文凭如何办理
一比一原版(QMUE毕业证书)英国爱丁堡玛格丽特女王大学毕业证文凭如何办理
 
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
 
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
 
Income Tax exemption for Start up : Section 80 IAC
Income Tax  exemption for Start up : Section 80 IACIncome Tax  exemption for Start up : Section 80 IAC
Income Tax exemption for Start up : Section 80 IAC
 
Profiles of Iconic Fashion Personalities.pdf
Profiles of Iconic Fashion Personalities.pdfProfiles of Iconic Fashion Personalities.pdf
Profiles of Iconic Fashion Personalities.pdf
 
The Most Inspiring Entrepreneurs to Follow in 2024.pdf
The Most Inspiring Entrepreneurs to Follow in 2024.pdfThe Most Inspiring Entrepreneurs to Follow in 2024.pdf
The Most Inspiring Entrepreneurs to Follow in 2024.pdf
 
The Genesis of BriansClub.cm Famous Dark WEb Platform
The Genesis of BriansClub.cm Famous Dark WEb PlatformThe Genesis of BriansClub.cm Famous Dark WEb Platform
The Genesis of BriansClub.cm Famous Dark WEb Platform
 

Security and confidentiality in Business

  • 1. 3.1 outline why security and confidentiality are important in a business environment
  • 2. Questions • What do businesses need to keep secure? • Why do they need to secure information, equipment and people? • What are the consequences for not securing information, people and equipment ?
  • 3. Why security and confidentiality are important in a business environment • Every company has resources which need to be kept secure. • In your groups discuss the types of resources that a company may need to secure. • These resources may take many forms, from the items owned by the company to the information it handles and the people who work there.
  • 4. What businesses need to keep secure and confidential! • Property- Buildings, company cars, computer equipment, storage facilities and any other valuable items kept on site needs to be protected from fire and theft.
  • 5. What businesses need to keep secure and confidential! continued… • Information- paper records and electronic date may contain sensitive information such as the personal details of employees, suppliers and customers, the financial information of the company and confidential business plans. • Data may also contain details that give the business competitive advantages, such as new products or initiatives. • All information should be kept secure in a way that prevents this information from becoming known to those who should not see it.
  • 6. What businesses need to keep secure and confidential! continued… • People- Members of staff and visitors have a right to be safe whilst on the business premises. • This includes maintaining health and safety and preventing unauthorized people from entering.
  • 7. The consequences • If steps are not taken to protect property, information and people, not only could the result be personal loss and trauma, but it could also harm the business’s finances and reputation
  • 8. How do businesses keep property secure? Task
  • 9. Business should have a range of procedures in place to ensure that property is kept secure at all times. In your groups, choose a company and discuss the procedure for securing information, property and people. You will need to present your ideas to the rest of the group.
  • 10. How businesses keep property secure Security passes • When you start to work at the company, you will probably be given your own security pass, usually with your name and photo on it. • You may be required to wear or carry it at all times, and often it will be needed to open doors. When you finish working for the company, you will need to hand it back.
  • 11. How businesses keep property secure Entry systems • Modern offices can usually only be accessed using security passes or key codes, which you need to type into a pad beside the door. • If you are given a key to a door, look after it carefully.
  • 12. How businesses keep property secure Alarm systems Businesses with audible alarm systems will have processes in place. Such as, how to set up or deactivate the the alarms if you are the first or last person on site. You should find out what to do beforehand.
  • 13. How businesses keep property secure Visitor procedures • Visitors should report to reception and be able to give the name of the person they are visiting. They will normally sign in and be given a pass for the day. They should be accompanied from reception to where they are going. • All visitors need to sign out when they leave the premises
  • 14. How businesses keep property secure Security labels • Valuable equipment, such as computers, should be labelled with a code so that they can be recovered more easily if they are stolen.